Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnWeb3SquareMore
Trade
Spot
Buy and sell crypto with ease
Margin
Amplify your capital and maximize fund efficiency
Onchain
Going Onchain, without going Onchain!
Convert
Zero fees, no slippage
Explore
Launchhub
Gain the edge early and start winning
Copy
Copy elite trader with one click
Bots
Simple, fast, and reliable AI trading bot
Trade
USDT-M Futures
Futures settled in USDT
USDC-M Futures
Futures settled in USDC
Coin-M Futures
Futures settled in cryptocurrencies
Explore
Futures guide
A beginner-to-advanced journey in futures trading
Futures promotions
Generous rewards await
Overview
A variety of products to grow your assets
Simple Earn
Deposit and withdraw anytime to earn flexible returns with zero risk
On-chain Earn
Earn profits daily without risking principal
Structured Earn
Robust financial innovation to navigate market swings
VIP and Wealth Management
Premium services for smart wealth management
Loans
Flexible borrowing with high fund security
GMX Hacker Starts Returning $40 Million in Stolen Crypto After Accepting Bounty

GMX Hacker Starts Returning $40 Million in Stolen Crypto After Accepting Bounty

KriptoworldKriptoworld2025/07/11 19:10
By:by Tatevik Avetisyan

The GMX hacker who stole $40 million in crypto has started returning the funds.

The person behind the GMX exploit wrote an on-chain message on July 11 saying, “Ok, funds will be returned later.” Blockchain security firm PeckShield flagged the message.

GMX Hacker Starts Returning $40 Million in Stolen Crypto After Accepting Bounty image 0 GMX Hacker Starts Returning $40 Million in Stolen Crypto After Accepting Bounty image 1 GMX Exploiter Returns $5.49M FRAX.. Source: PeckShieldAlert on X (@PeckShieldAlert)

This message came after the GMX team offered a $5 million white hat bounty in exchange for returning the funds.

The bounty was set at 10% of the stolen amount. GMX published its offer through an on-chain message and a public statement.

The hacker used the same address labeled “GMX Exploiter 2” to send the reply. PeckShield confirmed the address activity. This exploit targeted GMX v1, a decentralized exchange on Arbitrum.

First Transfers: Hacker Returns $9 Million in ETH

Less than an hour after the on-chain message, the GMX hacker returned 2,990 ETH, worth around $9 million, to the GMX-provided address. PeckShield confirmed the transaction on Ethereum, not Arbitrum.

The funds were returned to the wallet listed in GMX’s on-chain instructions. The GMX team had disabled minting, trading, and redeeming on GMX v1 contracts earlier in the week to stop the attack.

The GMX exploit involved manipulating the value of GLP tokens inside a liquidity pool on the Arbitrum blockchain.

GMX Hacker Starts Returning $40 Million in Stolen Crypto After Accepting Bounty image 2 GMX Hacker Starts Returning $40 Million in Stolen Crypto After Accepting Bounty image 3 GMX Hacker’s On-Chain Message Confirmed.Source: Arbiscan

$10.5 Million in FRAX Tokens Returned in Two Transfers

The GMX hacker sent more funds later the same day. First, $5.5 million in FRAX tokens was returned. Later, another $5 million in FRAX came back. PeckShield confirmed both transfers.

With these two transactions, the crypto returned totaled around $20 million, or half the stolen funds. The GMX team received all transfers in the addresses it provided.

FRAX is a stablecoin. These were among the various assets drained from the liquidity pool during the GMX exploit.

GMX Team Issues 48-Hour Legal Warning Before Refund Started

Before the refund, the GMX team issued a warning. In an on-chain message, they told the GMX hacker that legal action would follow if funds were not returned within 48 hours.

They also offered to prove the bounty was from clean funds. “The white hat bug bounty of $5 million continues to be available,” the GMX team wrote. They stated this would help the hacker avoid risks tied to stolen funds.

The message allowed the hacker to keep 10% of the stolen amount—$5 million—if they returned the other 90%.

GMX Exploit Details and Platform Response

The GMX exploit happened on July 10, targeting the first version of the trading platform deployed on Arbitrum. The hacker used a design flaw to manipulate GLP token values, draining crypto assets.

The GMX v1 contracts on both Arbitrum and Avalanche were paused to prevent further impact. The GMX team said they are working on security reviews.

At the time of writing, the GMX hacker had returned $20 million in total. The remaining $20 million had not been recovered.

The GMX team and PeckShield are monitoring the wallet activity. The final outcome remains pending.

0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Locked for new tokens.
APR up to 10%. Always on, always get airdrop.
Lock now!

You may also like

Subscribe to TANSSI Savings and enjoy up to 15% APR

Bitget Announcement2025/07/15 11:00

TACUSDT now launched for futures trading and trading bots

Bitget Announcement2025/07/15 10:40

Bitget Spot Bot adds PUMP/USDT

Bitget Announcement2025/07/15 08:00